Acceptable Use By: Keith R. Watson CoC Information Security Manager.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
Hart District Acceptable Use Policy Acceptable Use Policy.
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
Woodland Hills School District Computer Network Acceptable Use Policy.
ZACHARY HIGH’S LAPTOP PROGRAM. The Laptop Privilege  Teacher/student digital access pushes students to forefront in college preparation  Engaged students.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
INTERNET SAFETY FOR STUDENTS
Internet Safety, It’s a Teacher’s Responsibility, too!
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
AUP Acceptable Use Policy
INTERNET SAFETY FOR STUDENTS
Computer Basic By: Nat G7J.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
ESCCO Data Security Training David Dixon September 2014.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
AP ENGLISH/AP HISTORY DIGITAL CONVERSION PARENT INFORMATION MEETING.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Cloud Computing. Overview of Technology Accessible Anywhere Anytime.
Chapter 11 Information Systems Management. Q1:What are the responsibilities of the IS department? Q2:How is the IS department organized? Q3: What are.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
10/20/ SAI 2012 Statewide Mentor/Mentee Meeting Matt Carver, J.D., Director of Legal Services tel fax –
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Internet Safety Grades 3-4. What is the Internet? The Internet is a huge collection of computers around the world. These computers are all linked together,
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
TECHNOLOGY And we’re off………... ●Acceptable Use Policy at ●LABS ●Microsoft.
Squalicum High School Computer Network Student Use Guidelines.
Ethics in Public Service Act May 11, 2009 Ethical Use of Resources Presented by Senior Counsel, Assistant Attorney General Derek Edwards Washington State.
IBook Rules:. iBook Do’s: Use your iBook when under direction by a teacher or staff member. Keep all passwords secret. Charge your iBook every night!
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
GOOD INFORMATION SECURITY PRACTICES Keeping Sensitive Data Confidential Tim Thomas Region 6 Coordinator WCGRH LAN Engineer DHR/OIT.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Woodland Hills School District Computer Network Acceptable Use Policy.
Overview In this tutorial you will: identify different ways to access review your own skills identify rules to follow when using . There.
What you need to know.  Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Ian McGraw Education Safeguarding Team Surrey County Council.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Information Technology Acceptable Use An Overview
Home entertainment.
Things To Avoid: 1-Never your password to anyone.
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Unit 1 What’s a computer?. Instructions: In your own words define computer. A computer is an electronic machine that helps people do different activities.
Bluffs School 1:1 Digital Conversion Orientation for Parents August 2015.
Tools & Tips for keeping your kids safe online
It’s a Teacher’s Responsibility, too!
Computers in our life.
TECHNOLOGY
Client/Server and Peer to Peer
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Woodland Hills School District
Presentation transcript:

Acceptable Use By: Keith R. Watson CoC Information Security Manager

Acceptable Use, by Keith R. Watson 2 What is acceptable use? Simply – what you are allowed and not allowed to do with Georgia Tech owned resources. This includes: –Computers & Networks –Telephones, Cell Phones, & Fax Machines –Your Office, Office Furniture, Office Supplies, Credit Cards, & Vehicles –Everything owned by Georgia Tech (which in turn is owned by the State of Georgia)

What happens if you don’t comply? You are subject to disciplinary action up to and including: –Being fired –Criminal prosecution Acceptable Use, by Keith R. Watson 3

What is incidental personal use? We will focus on computer & network use. Personal use that does not prevent GT resources from being used for scholarly and business purposes and meets the following standards: –Does not create a security or legal risk for Georgia Tech. –Does not interfere with worker productivity. Acceptable Use, by Keith R. Watson 4

What is incidental personal use? – cont. –Does not consume more than a trivial amount of resources that could otherwise be used for scholarly or business purposes. –Does not require the installation of any software or hardware unrelated to business or scholarly use. –Does not constitute inappropriate behavior for a professional work environment. Acceptable Use, by Keith R. Watson 5

Examples of inappropriate personal use This will apply to GT owned laptop and desktop computers. –Letting family members and friends use your computer for any reason. –Doing your taxes or anyone else's taxes. –Installing software not related to business operations such as games. –Downloading music or videos. –Storing your legally owned music or videos. Acceptable Use, by Keith R. Watson 6

Examples of inappropriate personal use – cont. – for a business. –Viewing inappropriate material. –Using your computer for ANY non-GT business purposes regardless of financial gain. –This applies to work and home use of GT owned computers and laptops. Acceptable Use, by Keith R. Watson 7

Examples of appropriate personal use Listening to music or watching video online during breaks or lunch (must not interfere with your work or the work of others). Listening or watching your own music or video stored on your own storage device. Surfing the Internet (provided the material is appropriate, and the sites you visit are not hazardous to your computer). Acceptable Use, by Keith R. Watson 8

Examples of appropriate personal use – cont. Trivial use of GT such as “don’t forget to pickup milk on the way home”. Checking your non-business related personal web mail (e.g. Gmail, Hotmail, Yahoo! Mail). Checking your non-business related social networking sites (e.g. Facebook, MySpace, Twitter). Acceptable Use, by Keith R. Watson 9

Appropriate use rules of thumb Avoid activates that interfere with your work or the work of others. Don’t install any software that is not directly related to GT business use. Don’t store personal files not related to GT business (e.g. music, video, , taxes, Word or Excel documents). Don’t view material inappropriate for the work place. Acceptable Use, by Keith R. Watson 10

Appropriate use rules of thumb – cont. Don’t store non-GT related sensitive data. When it doubt – ask (we are not out to get you, we want to help). Acceptable Use, by Keith R. Watson 11

Resources & Questions Computer & Network Usage and Security Policy – USP.pdfhttp:// USP.pdf Keith R. Watson CoC Information Security Manager Questions? Acceptable Use, by Keith R. Watson 12